Sciweavers

181
Voted
TCC
2016
Springer
101views Cryptology» more  TCC 2016»
9 years 8 months ago
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser, Yael Tauman Kalai
88
Voted
TCC
2016
Springer
77views Cryptology» more  TCC 2016»
9 years 8 months ago
On the Complexity of Additively Homomorphic UC Commitments
We present a new constant round additively homomorphic commitment scheme with (amortized) computational and communication complexity linear in the size of the string committed to. ...
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jespe...
82
Voted
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
9 years 8 months ago
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare, Igors Stepanovs
77
Voted
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
9 years 8 months ago
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
88
Voted
TCC
2016
Springer
61views Cryptology» more  TCC 2016»
9 years 8 months ago
Homomorphic Evaluation Requires Depth
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented ...
Andrej Bogdanov, Chin Ho Lee
Cryptology
Top of PageReset Settings